Sandeep Sharma

ORCID: 0000-0001-7049-207X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Cloud Computing and Resource Management
  • Energy Harvesting in Wireless Networks
  • IoT and Edge/Fog Computing
  • Interconnection Networks and Systems
  • Mobile Ad Hoc Networks
  • Chaos-based Image/Signal Encryption
  • Cloud Data Security Solutions
  • IoT-based Smart Home Systems
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks
  • Distributed systems and fault tolerance
  • Cryptography and Data Security
  • Cryptographic Implementations and Security
  • Distributed and Parallel Computing Systems
  • Service-Oriented Architecture and Web Services
  • Coding theory and cryptography
  • Reservoir Engineering and Simulation Methods
  • Image Enhancement Techniques
  • Air Quality Monitoring and Forecasting
  • Internet of Things and AI
  • Supercapacitor Materials and Fabrication
  • Advanced Steganography and Watermarking Techniques
  • Security in Wireless Sensor Networks
  • UAV Applications and Optimization

Guru Nanak Dev University
2015-2025

Barkatullah University
2025

Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2022-2024

Alzaiem Alazhari University
2023

Yes Technologies (United States)
2019

Gautam Buddha University
2012-2018

Delft University of Technology
2017

Volvo (Sweden)
2015

Government Medical College, Amritsar
2015

Reliance Industries (United States)
2012

A Flying Ad-hoc network constitutes many sensor nodes with limited processing speed and storage capacity as they institute a minor battery-driven device quantity of energy. One the primary roles node is to store transmit collected information base station (BS). Thus, life span main criterion for efficient design FANETS Network, always have resources. In this paper, we present methodology an energy-efficient clustering algorithm collecting transmitting data based on Optimized Low-Energy...

10.3390/en14196016 article EN cc-by Energies 2021-09-22

Global warming is one of the most compelling environmental threats today, as rise in energy consumption and CO2 emission caused a dreadful impact on our environment. The data centers, computing devices, network equipment, etc., consume vast amounts that thermal power plants mainly generate. Primarily fossil fuels like coal oils are used for generation these induce various problems such global ozone layer depletion, which can even become cause premature deaths living beings. recent research...

10.3390/su14106256 article EN Sustainability 2022-05-20

FANET (flying ad-hoc networks) is currently a trending research topic. Unmanned aerial vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due to low battery power high mobility. Due these topological restrictions, FANETS considered more complicated than MANETs or VANETs. Clustering approaches based on artificial intelligence (AI) can be used solve complex issues when static dynamic routings fail. Evolutionary algorithm-based clustering techniques,...

10.3390/su14106159 article EN Sustainability 2022-05-19

In the past few decades, cutting-edge information and communication technology has been used in several ways to keep an eye on marine environment. Underwater wireless sensor networks (UWSNs) can measure amount of water soil conditions, such as salinity, moisture, movements, predict landslides. UWSNs are made up many underwater nodes (WSNs) that spread out across thalassic These have uses, including data collection, navigation, resource analysis, surveillance, disaster prediction, etc....

10.3389/fmars.2023.1117787 article EN cc-by Frontiers in Marine Science 2023-02-02

For efficient running of wireless sensor network applications, energy conservation the sensors becomes a prime paradigm for prolonging lifetime network. Taking this aspect into consideration, cluster head weight selection method called Cluster Chain Weight Metrics approach (CCWM) has been discussed that takes service parameters enhancing performance overall In clustering based one main concerns is appropriate heads in and formation balanced clusters. are selected first on metric then place....

10.1016/j.eij.2014.09.001 article EN cc-by-nc-nd Egyptian Informatics Journal 2014-11-01

Forest fires are a significant threat to the ecological system’s stability. Several attempts have been made detect forest using variety of approaches, including optical fire sensors, and satellite-based technologies, all which unsuccessful. In today’s world, research on flying ad hoc networks (FANETs) is thriving field can be used successfully. This paper describes unique clustering approach that identifies presence zone in transfers sensed data base station as soon feasible via wireless...

10.3390/drones6080193 article EN cc-by Drones 2022-08-02

Cloud computing facilitates the storage and management of huge volumes data. It offers flexibility for retrieving data anytime anywhere. In recent years, storing onto cloud achieved fame among corporations as well private users. Although, is drawing a lot attention still there are security, privacy, reliability interoperability concerns that need to be taken care. To deal with these issues, encryption comes rescue. Encrypting before uploading it prevents unauthorized users from accessing A...

10.1016/j.jksuci.2018.09.024 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2018-09-29

Visible Light Communication (VLC) has emerged as a promising technology for high-speed wireless communication, which employs the visible spectrum to transmit information. As title indicates, IEEE 802.15.7 is new standard dedicated VLC networks that introduces specializations match characteristics and needs of this medium. In networks, one key challenges scheduling Guaranteed Time Slots (GTS) efficiently better network performance minimum end-to-end delay while delivering reliable data. The...

10.47974/jios-1848 article EN Journal of Information and Optimization Sciences 2025-01-01

Supply Chain Management (SCM) in the Indian defense sector represents a strategic function that supports operational readiness and national preparedness. This study undertakes qualitative analysis based solely on secondary data sources to examine key dimensions of logistics operations. The research draws from government audit reports, policy documents, procurement reviews, institutional publications synthesize insights into current SCM practices. identifies several areas interest, including...

10.37868/dss.v6.id284 article EN cc-by Defense and Security Studies 2025-05-15

Effective supply chain management (SCM) is crucial for India's defense sector to ensure operational readiness and national security. However, persistent challenges in inventory control logistics coordination continue impact efficiency. This study examines the dynamics Gwalior, Madhya Pradesh, which holds strategic potential due industrial zones such as Malanpur Banmore. Despite this, local contribution procurement remains limited, evident Jabalpur Vehicle Plant's sourcing of only 10%...

10.59921/icestra.v2i1.74 article EN International Journal of Strategic Studies 2025-05-29

Shared-buffer ATM switches can have severe cell loss under asymmetrical or heavy loading conditions, which makes buffer management essential. In this paper, we study the shared-buffer system class of all work-conserving pushout policies and derive properties optimal policy, gives least-average expected total probability. a 2/spl times/2 with independent identically distributed Bernoulli arrivals, show that policy be characterized by single threshold. case correlated modeled discrete batch...

10.1109/90.793030 article EN IEEE/ACM Transactions on Networking 1999-01-01

In this paper, we have proposed an energy efficient chain based protocol which is improvement over ECBSN (Energy Efficient Chain Based Sensor Network). has certain deficiencies like the non optimal selection of leader nodes in rounds, aggregation and transmission data by head that leads to unbalanced consumption. Aiming at these problems, improved proposed. IECBSN adopts a new method on value (SV) parameter .To lower consumption further, one more level hierarchy been added with node, will...

10.4236/wsn.2013.54011 article EN Wireless Sensor Network 2013-01-01

Mobile ad hoc network (MANET) is a wireless without fixed infrastructure. Routing of MANET and its security are critical challenges due unique features. There many secure routing protocols presented. In this paper, an extensive survey various in The analysed terms end to delay, throughput, packet delivery ratio, minimum power, total energy consumed, normalised load, loss cost, battery capacity, drain rate control overhead.

10.1504/ijmndi.2016.078999 article EN International Journal of Mobile Network Design and Innovation 2016-01-01
Coming Soon ...